Secure Web Access Solution

Size: px
Start display at page:

Download "Secure Web Access Solution"

Transcription

1 Secure Web Access Solution

2 I. CONTENTS II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. E-CODE SECURE WEB ACCESS SOLUTION... 3 OVERVIEW... 3 PKI SECURE WEB ACCESS... 4 Description... 4 Benefits... 8 OTP SECURE WEB ACCESS... 9 Description... 9 Benefits I. ABOUT E-CODE

3 II. INTRODUCTION This document provides detailed technical description for the secure web access solution by E-Code. Overview E-Code Secure web Access is a solution that makes web access is more secure and eliminates any chance for credential hacking. E-Code Secure Web Access provides extra security with two or Three Factors Authentication based on Public Key Infrastructure (PKI). Also, this solution involves another method that uses One Time Password (OTP). Unlike normal username/password credentials, PKI and OTP are more secure that no hacker can attack. Copyrights and Trademarks All of the content on this manual and accompanying software(including all text, graphics, sounds, demos, patches, hints and other files) is covered under KSA and international copyright and trademark laws by E-Code and other companies, and are property of E-Code, or are presented with permission and/or under license. This content may not be used for any commercial use without express written permission of E-Code, and possibly other copyright and trademark owners. All other trademarks and copyrights are the property of their respective owners. 2015, E-Code 2

4 III. E-CODE SECURE WEB ACCESS SOLUTION Overview Online transactions is an essential part of todays live, that every moment is entering new fields and applications. With the launch of the initiatives towards e-government and e-commerce, the demand to secure and reliable web access is very important.some transactions are made for online payments and other for entertainment like games portals, which is less critical and sensitivity than financial transactions. Other actions such as logging to enterprise resources remotely are critical that a strict user identity must be proved. Most web sites and web applications depend on user name and passwords authentication, which is not a secure way for authentication. User password may be hacked and stolen through many ways such as; keystroke loggers, or brute force attacks, or even from the server side. Another issue with username/password credentials that user will not recognize a hacker has stolen the password and is using them. Another issue is that static username/password are cached in the web browser. This is extremely dangerous that hacker can attack the browser and retrieve these credentials or even another person can use them to login later from the same machine. Hacker Password Hacking Web Server User Masquerade attack is a common example of the hacker s activities in web services/applications that represents the problem. Hacker attacks the user machine and stoles the username/password credentials. Now the hacker uses these credential to access the web server simultaneously or later after user logs out. Money steal or publishing illegal and harmful content on behalf user is what the hacker can do now. E-Code Secure Web Access Solution provides a secure and reliable connection to websites and applications. Using hardware token (PKI/OTP) that holds the user s credentials is the basic idea of the 3

5 solution. Hardware devices is secure and cannot be copied. Also, when the token is lost user can take action to suspend the service or account related to that token. E-Code solution includes two alternatives: 1- PKI Based Secure Web Access. 2- OTP Based Secure Web Access These alternatives are described below with details about modules, features, and benefits. PKI Secure Web Access Description This solution is intended to provide a hardware authentication technique to web sites and web applications. In this solution, E-Code Smart Token is used to store the user certificate that will be the user credentials to access the website. The Secure Web Authentication uses SSL certificate installed on web server, and signed certificates installed on Smart token to establish a Secure Internet Connection between web browser and web site. In this case, the website uses https connection which is more secure a reliable than normal http connection. SSL Token Web Server Token CA Server Database Server Secure PKI Web Access Architecture As shown in the above figure, each user can connect to the web server and access the website/web application if and if only the user has smart token connected to the PC. This smart token is a secure storage for the user certificate which is signed from the same web server issuer. The user who doesn t hold the smart token or has a token with wrong certificate is unauthorized. The server identifies itself 4

6 to the callers through the SSL certificate. The SSL protocol requires user certificate from client side. These certificate will be verified at server side through integrity check and CRL validation. The CA server is the responsible for issuing certificates to the smart token. This CA also may issue the SSL certificate for the web server. Client Hello Server Hello Web Browser Key Exchange Server HTTP Get Data Transfer HTTPS Connection Flow The PKI based secure web access method uses different modules to complete the cycle of authentication. Initially, the website must have an SSL Certificate. Then the connection with the website will be changed to be https instead of normal http. The user must have a personal certificate issued and signed from the same issuer of the webserver SSL certificate. So that, a certificate authority system is an essential module of the system. CERTIFICATE AUTHORITY E-Code Certificate Authority (CA) is a desktop application that runs on all windows versions. All actions related to E-Code CA can be acquired through the application user interface. It requires no internet connection or any scripting experience to manage. E-Code CA user interface includes two main functionalities: CA operations and token management operations. E-Code CA provides all the actions related to certificate authority: certificate issuance, certificate management (export, import), certificate revocation, and backup. E-Code CA is managed by one system administrator using one token containing root certificate. Users who do not have that token can only export public certificates of the users in the database. This increases the security of the system as only one person is authorized to make changes to the CA. 5

7 E-Code CA supports certificate issuance according to the X.509 standard. Also, issued certificates can have any (key & extended key) usages. Certificate issuance require that the token or smart card is connected to the CA machine. No remote issuance is supported that the CA system is simplified. E-Code CA supports the certificate issuance hierarchy. This is done by issuing Root CA that issue subroots. These subroots will issue another subroots or personal certificates. This feature can be used to structure the enterprise in the certificate issuance process. 6

8 For secure web access, it is required to issue SSL certificate for the website/application. This is available using E-Code CA. Hence, personal certificate for the users and the web server certificate will be issued from E-Code CA. WEB SERVER INTEGRATION Integration with website s webserver to authenticate users using PKI certificate. E-Code integration is applicable for any web server that support SSL communication such as IIS and Apache. The integration work involves installing the SSL certificate on the server, trusting the root certificate at the server machine, modify the user authentication technique to use PKI certificates only. In cases, a developed code may be injected to force user login through certificates. SMART TOKEN To have the complete solution secure without any weak point, the user s personal certificate must be stored on a secure hardware device that is impossible to duplicate. Here comes the importance of the smart token module as it will be the user electronic identity. This token is protected with security PIN so that, only rightful owner can use. This PIN expires after number of wrong trials and token is locked. Thus, no worry about losing the token, as no one can use it except its owner. E-Code Smart Token (esign) is a security hardware device. It provides the digital signature and data encryption services. esign is offered in three hardware models, basic, standard and biometric. esign provides digital certificate generation and management, electronic signing and verification, data encryption and decryption. All secure operations are completely provided by the internal device hardware. esign complies with security standards for digital signature and data encryption. It supports PKCS, CSP, X509, SSL and PS/SC standards. Compliance with security standards allows the automatic integration with many applications, for example clients, internet browsers, computer login and different network access services. esign protected by two and three factor authentication. Beside mandatory password authentication, it uniquely supported with accurate and reliable fingerprint identification system. E-Code CA features can divided into two categories: CA features and Token management features. 7

9 Benefits HIGH SECURITY A number of security mechanisms are employed, helping significantly to eliminate the risk of fraud, attacks and misuse from unauthorized individuals and hackers. The connection is the most secure internet connection SSL that guarantees at server and client sides required security level. Also, the user ID is stored on secure Hardware that cannot be duplicated. The hardware is protected by user PIN/Fingerprint to assure only the token owner will use it. EASY ADMINISTRATION E-Code PKI solution for web access provides easy and simple method to control the access to the website using Certificate Revocation List (CRL). CRL enables the admin to prevent a user from access the server temporarily or permanently. STANDARDS COMPLIED E-Code PKI web access solution supports and the X.509 standards and CRL standards version 3.0. Also, supports PKCS#11 standard for hardware security devices. USABILITY E-Code Secure Web Access Solution is easy to deploy and use with any website or any web application. COMPATIBILITY The PKI solution is compatible with all applications and environment that makes it suitable and easy to use for any case. The solution is compatible with web servers IIS and Apache. Also, the solution is compatible with Web Browsers Internet Explorer, Chrome, and Mozilla Firefox. The solution can be used with different Operating Systems as E-Code Smart Token is compatible with Windows (32/64 Bit) 2K, XP, 2003, Vista, 7, 8, 2008 and Linux (32 Bit). 8

10 OTP Secure Web Access Description One-Time Password Today is one of simplest and most popular forms of two-factor authentication for securing network access. For example, in large organizations and enterprises, a VPN or a website access often requires One-Time Password tokens for user authentication. One-Time Passwords are often preferred because an air-gap device does not require the installation of any client desktop software drivers on the user machine, and therefore allowing them to support multiple machines including home computers, kiosks, and personal digital assistants. OTP RADIUS system provides solution for user authentication using the one time password OTP method with the back end system at the server side. It allows the end user to perform his authentication through one click/touch. The user requests an access to a service, the system then sends an authentication request to the OTP server through the radius protocol. The OTP server responses with success or failure. Finally, the web application service permits the user to access it or prevents him PC + OTP Device to generate OTP Operator Administrator Smart Phone Internet Load Balancer Firewall Web Server OTP Radius Server PC + Smart phone to generate OTP Tablet Users Data Base or LDAP Server The OTP RADIUS system contains different functional components with different administration interfaces. Each component can be managed separately through its interface. On the other hand the system supports different operating systems, hence it supports end users who use multiple access devices. Like PCs, Laptops, Tablets and smart phones. 9

11 End User OTP (SW/HW Tokens) OTP Radius Server Radius Protocol Web Application Server Users DB or LDAP Server The system can be described as four entities:- 1. OTP RADIUS server. 2. OTP Client (OTP Generator). 3. Web application (Web application) NAS. 4. Users Database. OTP RADIUS SERVER This module is the core component of the OTP RADIUS system, it provides high performance authentication processes via secure communication protocol, the Remote Authentication Dial-in User Service (RADIUS protocol). The OTP server application receives users credentials, communicates with the Database/LDAP server to authenticate the user. And finally, it responds to the web server with accept or reject for the user access request. 10

12 The server receives the access-request packets from the web application server (Radius Client NAS), including the parameters of the user and recent generated OTP on his device/application. The server checks the received information are they correct or not, using the users data base server applying an authentication scheme, like PAP and CHAP. It verifies the incoming OTP with the internally generated OTP. OTP generators in both server/client sides must have the same parameters and state. RADIUS protocol can be explained as following: If the match succeeded, an Access-Accept packet is sent by the OTP server back to the web application server, which then permits the end user access the web application. If the match failed, an Access-Reject packet is sent back to the application server, which then unconditionally prevents the end user from accessing the web application. Also, the OTP server may respond to the to the Access-Request packet by an Access- Challenge Packet. This is done in more complex authentication dialogs, where a secure session is opened between the OTP server and the end user in a manner that the sent credentials are being hidden from the web application server (Radius Client NAS). USERS DATABASE SERVER One of the major components in the OTP RADIUS system is the storage system which holds the system users with their parameters. This storage can be a database or LDAP server. The database or the LDAP contains his username, recent OTP generated, seed number and another parameters related to him. The OTP RADIUS server can be integrated with different storages, either LDAP directories or SQL databases. WEB APPLICATION SERVER (RADIUS CLIENT) The frontend for the OTP RADIUS system is the Website that the end user sees and interact directly. In the Radius environment it is called NAS (Network Access Servers). NAS acts as the only gateway to access the protected OTP server. Radius protocol establishes any connection with only NAS. The Web application NAS connects to the OTP server, passing the credentials of a user. The OTP server then searches the user through its DB or LDAP server and notifies the NAS whether it grants the user to access its services or not. 11

13 OTP authentication is just sending username and password using appropriate protocol like CHAP and receiving the response. This requires change the default authentication mechanism of the application server to the OTP mechanism. Configuration should be applied to the application server to use OTP mechanism. This might require different code to be integrated with the application server. Web programming will be used to apply this configuration to construct secure communication with OTP server. OTP CLIENT (OTP GENERATOR) OTP client is the two factor authentication module, which the client uses to generate the OTP required to access the service. The OTP generator can be either software token installed on any portable device, or hardware token with by the user that generates OTP only. Hardware OTP Token The above figure shows the Bio-OTP smart card generator. This card uses fingerprint authentication to recognize its owner. Then, after successful user fingerprint authentication, the OTP is generated on the card display. Software OTP Token OTP RADIUS system supports hardware and software tokens with different One-Time Password algorithms like TOTP, HOTP and MOTP. 12

14 HOTP: HMAC algorithm generates the OTP based on a static symmetric key and increasing counter value. TOTP: Time based OTP algorithm uses the current time and a shared secret key to generate the OTP. MOTP: Mobile-OTP algorithm is based on time synchronous one time passwords. E-Code will provide software OTP Generator with the system. The software token will provide the different algorithms discussed before. It also will be two factor authentication solution. The software OTP Generator token will provide the different algorithms discussed before. It also will be two-factor authentication solution. E-Code will provide its customized software token to be used on smart phone or any portable device. This software token will be two factor authentication based. User will enter the PIN that will generate OTP to be used for login. E-Code OTP client generator also can be used with hardware OTP token. This hardware OTP token uses on board algorithm to generate OTP. This hardware token is synchronized with the server so that each OTP can be verified at the server. Benefits SECURITY OTP RADIUS system allows the user information to be stored on one host, minimizing the risk of security loopholes. Two reasons cause this ultimate security. The first is the use of the OTP authentication technology. And the second is the strong secure communication between the system entities, which achieved by the Radius protocol. Hence two major security technologies are integrated together to produce the OTP Radius System. The solution solves the password caching problem. EASE OF USE One click/touch; one response. The user has no need to identify himself through multiple steps, just submit his username and OTP and make one click/touch, where the web application passes the submitted credentials and identities, return back with respond of Accept or Reject. The OTP solution requires no driver to be installed at the user side. FLEXIBILITY The web application server is not indeed the targeted NAS, because NAS is always can be any electronic device that have an interface with a computer. So, any device can use the OTP RADIUS server in users authentication. Also, integration with different databases or LDAP directories is provided by the OTP RADIUS system. HIGH PERFORMANCE 13

15 The OTP server responses quickly to authentication requests received from applications servers. HIGH AVAILABILITY The OTP server is more reliable for long term operation. MAINTAINABILITY Using the available integrated QA tests to troubleshoot and maintain the OTP server components. Also, with existing testing applications to test the OTP server. Also, the ability to resynchronize token during authentication. EASY ADMINISTRATION The solution does not require much skill or experience for the system admin. All administration actions are done easily through the backend interface. CERTIFICATION OTP RADIUS server is OATH certified for both TOTP and HOTP tokens. Also, PSKC encrypted files are supported. 14

16 I. ABOUT E-CODE E-Code is a leading progressive, innovative company in the field of information security providing technology, state of the art solutions, consulting, integration and testing services to safeguard the information assets, identities and the supporting infrastructure against unauthorized use. Our high quality service and excellent benefits and the ability of being reliable and responsible put us as a leader on the top of digital security companies. E-Code provides unique products and solutions, which cover many security areas fulfilling customers need in different market sectors. We provide a set of products and solutions covering the following areas: software protection, data encryption, security hardware, digital signature, secure identification and authentication, secure online distribution of digital Contents. We supports different market sectors like; governmental institutes, organizations, banks, software development companies, multimedia software and game producers, media and ebooks publishers and individual users. Dongle Fingerprint Smart Token Smart Card Fingerprint Smart OTP Card Smart Token Fingerprint OTP Token Secure SD Card Secure Flash with Fingerprint Website info@e-code.com, support@e-code.com, sales@e-code.com Telephone Fax 15

17

Secure Data Exchange Solution

Secure Data Exchange Solution Secure Data Exchange Solution I. CONTENTS I. CONTENTS... 1 II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. SECURE DOCUMENT EXCHANGE SOLUTIONS... 3 INTRODUCTION... 3 Certificates

More information

Secure USB Flash Drive. Biometric & Professional Drives

Secure USB Flash Drive. Biometric & Professional Drives Secure USB Flash Drive Biometric & Professional Drives I. CONTENTS II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. SECURE FLASH DRIVE... 3 DESCRIPTION... 3 IV. MODULES OF SECURE

More information

Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment

Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment IIIIII Best Practices www.gemalto.com IIIIII Table of Contents Strong Authentication and Cybercrime... 1

More information

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0 Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust

More information

A brief on Two-Factor Authentication

A brief on Two-Factor Authentication Application Note A brief on Two-Factor Authentication Summary This document provides a technology brief on two-factor authentication and how it is used on Netgear SSL312, VPN Firewall, and other UTM products.

More information

DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication

DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication Certificate Based 2010 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 31 Disclaimer Disclaimer of

More information

FileCloud Security FAQ

FileCloud Security FAQ is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file

More information

2.2.1. Astaro User Portal: Getting Software and Certificates...13. 2.2.2. Astaro IPsec Client: Configuring the Client...14

2.2.1. Astaro User Portal: Getting Software and Certificates...13. 2.2.2. Astaro IPsec Client: Configuring the Client...14 1. Introduction... 2 2. Remote Access via IPSec... 2 2.1. Configuration of the Astaro Security Gateway... 2 2.2. Configuration of the Remote Client...13 2.2.1. Astaro User Portal: Getting Software and

More information

DIGIPASS Authentication for Cisco ASA 5500 Series

DIGIPASS Authentication for Cisco ASA 5500 Series DIGIPASS Authentication for Cisco ASA 5500 Series With IDENTIKEY Server 2010 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 20 Disclaimer Disclaimer of Warranties and Limitations

More information

DIGIPASS Authentication for Sonicwall Aventail SSL VPN

DIGIPASS Authentication for Sonicwall Aventail SSL VPN DIGIPASS Authentication for Sonicwall Aventail SSL VPN With VASCO IDENTIKEY Server 3.0 Integration Guideline 2009 Vasco Data Security. All rights reserved. PAGE 1 OF 52 Disclaimer Disclaimer of Warranties

More information

Sophos Mobile Control Installation guide. Product version: 3

Sophos Mobile Control Installation guide. Product version: 3 Sophos Mobile Control Installation guide Product version: 3 Document date: January 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...16 4 External

More information

PROXKey Tool User Manual

PROXKey Tool User Manual PROXKey Tool User Manual 1 Table of Contents 1 Introduction...4 2 PROXKey Product... 5 2.1 PROXKey Tool... 5 2.2 PROXKey function modules...6 2.3 PROXKey using environment...6 3 PROXKey Tool Installation...7

More information

DIGIPASS Authentication for Check Point Connectra

DIGIPASS Authentication for Check Point Connectra DIGIPASS Authentication for Check Point Connectra With IDENTIKEY Server 2009 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 21 Disclaimer Disclaimer of Warranties and Limitations

More information

White Paper. The risks of authenticating with digital certificates exposed

White Paper. The risks of authenticating with digital certificates exposed White Paper The risks of authenticating with digital certificates exposed Table of contents Introduction... 2 What is remote access?... 2 Authentication with client side digital certificates... 2 Asymmetric

More information

Internet Banking Two-Factor Authentication using Smartphones

Internet Banking Two-Factor Authentication using Smartphones Internet Banking Two-Factor Authentication using Smartphones Costin Andrei SOARE IT&C Security Master Department of Economic Informatics and Cybernetics Bucharest University of Economic Studies, Romania

More information

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication

More information

RSA SecurID Two-factor Authentication

RSA SecurID Two-factor Authentication RSA SecurID Two-factor Authentication Today, we live in an era where data is the lifeblood of a company. Now, security risks are more pressing as attackers have broadened their targets beyond financial

More information

Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard

Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands Ian Wills Country Manager, Entrust Datacard WHO IS ENTRUST DATACARD? 2 Entrust DataCard Datacard Corporation. Corporation.

More information

Advanced Authentication

Advanced Authentication White Paper Advanced Authentication Introduction In this paper: Introduction 1 User Authentication 2 Device Authentication 3 Message Authentication 4 Advanced Authentication 5 Advanced Authentication is

More information

Corporate and Payment Card Industry (PCI) compliance

Corporate and Payment Card Industry (PCI) compliance Citrix GoToMyPC Corporate and Payment Card Industry (PCI) compliance GoToMyPC Corporate provides industryleading configurable security controls and centralized endpoint management that can be implemented

More information

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate

More information

TrustKey Tool User Manual

TrustKey Tool User Manual TrustKey Tool User Manual 1 Table of Contents 1 Introduction... 5 2 TrustKey Product...6 2.1 TrustKey Tool... 6 2.2 TrustKey function modules...7 2.3 TrustKey using environment...7 3 TrustKey Tool Installation...

More information

BlackShield ID Agent for Remote Web Workplace

BlackShield ID Agent for Remote Web Workplace Agent for Remote Web Workplace 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication may be reproduced,

More information

Two-Factor Solutions Choosing the Right One"

Two-Factor Solutions Choosing the Right One Copyright (c) 2013 RCDevs S.A. (http://www.rcdevs.com) - Page 1/ Two-Factor Solutions Choosing the Right One By RCDevs (http://www.rcdevs.com/) The need to secure access to online applications and resources

More information

Entrust Managed Services PKI

Entrust Managed Services PKI Entrust Managed Services PKI Entrust Managed Services PKI Windows Smart Card Logon Configuration Guide Using Web-based applications Document issue: 1.0 Date of Issue: June 2009 Copyright 2009 Entrust.

More information

Protecting Microsoft Internet Information Services Web Servers with ISA Server 2004

Protecting Microsoft Internet Information Services Web Servers with ISA Server 2004 Protecting Microsoft Internet Information Services Web Servers with ISA Server 2004 White Paper Published: June 2004 For the latest information, please see http://www.microsoft.com/isaserver/ Contents

More information

DIGIPASS Authentication for GajShield GS Series

DIGIPASS Authentication for GajShield GS Series DIGIPASS Authentication for GajShield GS Series With Vasco VACMAN Middleware 3.0 2008 VASCO Data Security. All rights reserved. Page 1 of 1 Integration Guideline Disclaimer Disclaimer of Warranties and

More information

WHITE PAPER Usher Mobile Identity Platform

WHITE PAPER Usher Mobile Identity Platform WHITE PAPER Usher Mobile Identity Platform Security Architecture For more information, visit Usher.com info@usher.com Toll Free (US ONLY): 1 888.656.4464 Direct Dial: 703.848.8710 Table of contents Introduction

More information

Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015

Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015 Mobile OTPK Technology for Online Digital Signatures Dec 15, 2015 Presentation Agenda The presentation will cover Background Traditional PKI What are the issued faced? Alternative technology Introduction

More information

Installation and Configuration Guide

Installation and Configuration Guide Entrust Managed Services PKI Auto-enrollment Server 7.0 Installation and Configuration Guide Document issue: 1.0 Date of Issue: July 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark

More information

WHITE PAPER. Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ)

WHITE PAPER. Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ) WHITE PAPER Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ) SEPTEMBER 2004 Overview Password-based authentication is weak and smart cards offer a way to address this weakness,

More information

SSL VPN Technology White Paper

SSL VPN Technology White Paper SSL VPN Technology White Paper Keywords: SSL VPN, HTTPS, Web access, TCP access, IP access Abstract: SSL VPN is an emerging VPN technology based on HTTPS. This document describes its implementation and

More information

NetIQ Advanced Authentication Framework

NetIQ Advanced Authentication Framework NetIQ Advanced Authentication Framework Security Officer Guide Version 5.2.0 1 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 Authenticators Management 4 Card 8 Email OTP

More information

DIGIPASS Authentication for Check Point Security Gateways

DIGIPASS Authentication for Check Point Security Gateways DIGIPASS Authentication for Check Point Security Gateways With IDENTIKEY Server 2009 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 38 Disclaimer Disclaimer of Warranties and

More information

Digital Signatures on iqmis User Access Request Form

Digital Signatures on iqmis User Access Request Form Digital Signatures on iqmis User Access Request Form When a user clicks in the User Signature block on the iqmis Access Form, the following window appears: Click Save a Copy and rename it with your name,

More information

Integration Guide. SafeNet Authentication Service. SAS Using RADIUS Protocol with Microsoft DirectAccess

Integration Guide. SafeNet Authentication Service. SAS Using RADIUS Protocol with Microsoft DirectAccess SafeNet Authentication Service Integration Guide SAS Using RADIUS Protocol with Microsoft DirectAccess Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet,

More information

e-code Academy Information Security Diploma Training Discerption

e-code Academy Information Security Diploma Training Discerption e-code Academy Information Security Diploma Training 2015 I. CONTENTS II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. OBJECTIVE... 3 LIST OF POSTGRADUATE COURSES... 3 FIRST SEMESTER

More information

PINsafe Multifactor Authentication Solution. Technical White Paper

PINsafe Multifactor Authentication Solution. Technical White Paper PINsafe Multifactor Authentication Solution Technical White Paper Abstract PINsafe is a flexible authentication solution that offers a wide range of authentication models. The use of the patented one-time

More information

Strong Authentication for Secure VPN Access

Strong Authentication for Secure VPN Access Strong Authentication for Secure VPN Access Solving the Challenge of Simple and Secure Remote Access W H I T E P A P E R EXECUTIVE SUMMARY In today s competitive and efficiency-driven climate, organizations

More information

Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006

Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006 Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates September 2006 Copyright 2006 Entrust. All rights reserved. www.entrust.com Entrust is a registered trademark

More information

Enhancing Web Application Security

Enhancing Web Application Security Enhancing Web Application Security Using Another Authentication Factor Karen Lu and Asad Ali Gemalto, Inc. Technology & Innovations Austin, TX, USA Overview Introduction Current Statet Smart Cards Two-Factor

More information

Remote Access Securing Your Employees Out of the Office

Remote Access Securing Your Employees Out of the Office Remote Access Securing Your Employees Out of the Office HSTE-NB0011-RV 1.0 Hypersecu Information Systems, Inc. #200-6191 Westminster Hwy Richmond BC V7C 4V4 Canada 1 (855) 497-3700 www.hypersecu.com Introduction

More information

Compiled By: Chris Presland v1.0. 29 th September. Revision History Phil Underwood v1.1

Compiled By: Chris Presland v1.0. 29 th September. Revision History Phil Underwood v1.1 Compiled By: Chris Presland v1.0 Date 29 th September Revision History Phil Underwood v1.1 This document describes how to integrate Checkpoint VPN with SecurEnvoy twofactor Authentication solution called

More information

Guide to Evaluating Multi-Factor Authentication Solutions

Guide to Evaluating Multi-Factor Authentication Solutions Guide to Evaluating Multi-Factor Authentication Solutions PhoneFactor, Inc. 7301 West 129th Street Overland Park, KS 66213 1-877-No-Token / 1-877-668-6536 www.phonefactor.com Guide to Evaluating Multi-Factor

More information

Authentication Levels. White Paper April 23, 2014

Authentication Levels. White Paper April 23, 2014 Summary White Paper April 23, 2014 This document describes levels of authentication that can be utilized for users known and unknown to gain access to applications and solutions. Summary... 1 Description...

More information

Fireware How To Authentication

Fireware How To Authentication Fireware How To Authentication How do I configure my Firebox to authenticate users against my existing RADIUS authentication server? Introduction When you use Fireware s user authentication feature, you

More information

ABOUT TOOLS4EVER ABOUT DELOITTE RISK SERVICES

ABOUT TOOLS4EVER ABOUT DELOITTE RISK SERVICES CONTENTS About Tools4ever... 3 About Deloitte Risk Services... 3 HelloID... 4 Microsoft Azure... 5 HelloID Security Architecture... 6 Scenarios... 8 SAML Identity Provider (IDP)... 8 Service Provider SAML

More information

Check Point FW-1/VPN-1 NG/FP3

Check Point FW-1/VPN-1 NG/FP3 Check Point FW-1/VPN-1 NG/FP3 Implementation Guide Copyright Copyright 2006, CRYPTOCard Corp. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

More information

Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Outlook Web Access 1.06

Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Outlook Web Access 1.06 SafeNet Authentication Service Configuration Guide 1.06 Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information

More information

Research Article. Research of network payment system based on multi-factor authentication

Research Article. Research of network payment system based on multi-factor authentication Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(7):437-441 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Research of network payment system based on multi-factor

More information

ViSolve Open Source Solutions

ViSolve Open Source Solutions ViSolve Open Source Solutions Best-In-Class Authentication and Authorization Solutions & Services ViSolve Inc. ViSolve Securing Digital Assets Contents Security Overview Security Concerns Security Needs

More information

www.rohos.com Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon

www.rohos.com Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon Secure Windows and Mac login by USB key www.rohos.com Rohos Logon Key Secure two-factor

More information

DIGIPASS Authentication for Citrix Access Gateway VPN Connections

DIGIPASS Authentication for Citrix Access Gateway VPN Connections DIGIPASS Authentication for Citrix Access Gateway VPN Connections With VASCO Digipass Pack for Citrix 2006 VASCO Data Security. All rights reserved. Page 1 of 31 Integration Guideline Disclaimer Disclaimer

More information

WEB SECURITY. Oriana Kondakciu 0054118 Software Engineering 4C03 Project

WEB SECURITY. Oriana Kondakciu 0054118 Software Engineering 4C03 Project WEB SECURITY Oriana Kondakciu 0054118 Software Engineering 4C03 Project The Internet is a collection of networks, in which the web servers construct autonomous systems. The data routing infrastructure

More information

Cleaning Encrypted Traffic

Cleaning Encrypted Traffic Optenet Documentation Cleaning Encrypted Traffic Troubleshooting Guide iii Version History Doc Version Product Date Summary of Changes V6 OST-6.4.300 01/02/2015 English editing Optenet Documentation

More information

DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access

DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access With IDENTIKEY Server / Axsguard IDENTIFIER Integration Guidelines Disclaimer Disclaimer of Warranties and Limitations

More information

CA ArcotOTP Versatile Authentication Solution for Mobile Phones

CA ArcotOTP Versatile Authentication Solution for Mobile Phones PRODUCT SHEET CA ArcotOTP CA ArcotOTP Versatile Authentication Solution for Mobile Phones Overview Consumers have embraced their mobile phones as more than just calling or texting devices. They are demanding

More information

Sophos Mobile Control Installation guide. Product version: 3.5

Sophos Mobile Control Installation guide. Product version: 3.5 Sophos Mobile Control Installation guide Product version: 3.5 Document date: July 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...10 4 External

More information

Lesson Plans Administering Security in a Server 2003 Network

Lesson Plans Administering Security in a Server 2003 Network Lesson Plans Administering Security in a Server 2003 Network (Exam 70-299) Version 2.0 Table of Contents Table of Contents... 1 Course Overview... 2 Section 1.1: Course Introduction... 4 Section 1.2: Active

More information

User Authentication. FortiOS Handbook v3 for FortiOS 4.0 MR3

User Authentication. FortiOS Handbook v3 for FortiOS 4.0 MR3 User Authentication FortiOS Handbook v3 for FortiOS 4.0 MR3 FortiOS Handbook User Authentication v3 16 December 2011 01-433-122870-20111216 Copyright 2011 Fortinet, Inc. All rights reserved. Contents and

More information

External Authentication with CiscoSecure ACS. Authenticating Users Using. SecurAccess Server. by SecurEnvoy

External Authentication with CiscoSecure ACS. Authenticating Users Using. SecurAccess Server. by SecurEnvoy External Authentication with CiscoSecure ACS Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington Business

More information

Check Point FDE integration with Digipass Key devices

Check Point FDE integration with Digipass Key devices INTEGRATION GUIDE Check Point FDE integration with Digipass Key devices 1 VASCO Data Security Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document

More information

Securing corporate assets with two factor authentication

Securing corporate assets with two factor authentication WHITEPAPER Securing corporate assets with two factor authentication Published July 2012 Contents Introduction Why static passwords are insufficient Introducing two-factor authentication Form Factors for

More information

Interlink Networks RAD-Series AAA Server and RSA Security Two-Factor Authentication

Interlink Networks RAD-Series AAA Server and RSA Security Two-Factor Authentication Interlink Networks RAD-Series AAA Server and RSA Security Two-Factor Authentication As the world increasingly depends on computers to do business, the need for safeguarding computer resources also increases.

More information

Network Automation 9.22 Features: RIM and PKI Authentication July 31, 2013

Network Automation 9.22 Features: RIM and PKI Authentication July 31, 2013 Network Automation 9.22 Features: RIM and PKI Authentication July 31, 2013 Brought to you by Vivit Network Management Special Interest Group (SIG) Leaders: Wendy Wheeler and Chris Powers www.vivit-worldwide.org

More information

Administrators Help Manual

Administrators Help Manual Administrators Help Manual Lepide Active Directory Self Service Lepide Software Private Limited Page 1 Administrators Help Manual for Active Directory Self-Service Lepide Active Directory Self Service

More information

RSA Solution Brief. RSA SecurID Authentication in Action: Securing Privileged User Access. RSA Solution Brief

RSA Solution Brief. RSA SecurID Authentication in Action: Securing Privileged User Access. RSA Solution Brief RSA SecurID Authentication in Action: Securing Privileged User Access RSA SecurID solutions not only protect enterprises against access by outsiders, but also secure resources from internal threats The

More information

Smart Card Certificate Authentication with VMware View 4.5 and Above WHITE PAPER

Smart Card Certificate Authentication with VMware View 4.5 and Above WHITE PAPER Smart Card Certificate Authentication with VMware View 4.5 and Above WHITE PAPER Table of Contents.... About This Paper.... 3 Introduction... 3 Smart Card Overview.... 3 Getting Started... 4 Authenticating

More information

YubiKey Authentication Module Design Guideline

YubiKey Authentication Module Design Guideline YubiKey Authentication Module Design Guideline Yubico Application Note Version 1.0 May 7, 2012 Introduction Disclaimer Yubico is the leading provider of simple, open online identity protection. The company

More information

KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS

KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS Plurilock Security Solutions Inc. www.plurilock.com info@plurilock.com 2 H IGHLIGHTS: PluriPass is Plurilock static keystroke dynamic biometric

More information

Schlumberger PKI /Corporate Badge Deployment. Neville Pattinson Director of Business Development & Technology IT & Public Sector

Schlumberger PKI /Corporate Badge Deployment. Neville Pattinson Director of Business Development & Technology IT & Public Sector Schlumberger PKI /Corporate Badge Deployment Neville Pattinson Director of Business Development & Technology IT & Public Sector 1 Overview Background Overview of the PKI and Corporate Badge components

More information

2 factor + 2. Authentication. way

2 factor + 2. Authentication. way 2 factor + 2 way Authentication Deepnet DualShield is an open, unified authentication platform that enables multi-factor strong authentication across diverse applications, users and security tokens. 5

More information

VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government.

VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government. END USER S GUIDE VeriSign PKI Client Government Edition v 1.5 End User s Guide VeriSign PKI Client Government Version 1.5 Administrator s Guide VeriSign PKI Client VeriSign, Inc. Government Copyright 2010

More information

Frequently Asked Questions (FAQs) SIPRNet Hardware Token

Frequently Asked Questions (FAQs) SIPRNet Hardware Token Air Force Public Key Infrastructure System Program Office (ESC/HNCDP) Phone: 210-925-2562 / DSN: 945-2562 Web: https://afpki.lackland.af.mil Frequently Asked Questions (FAQs) SIPRNet Hardware Token Updated:

More information

Sync Security and Privacy Brief

Sync Security and Privacy Brief Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical

More information

Xerox DocuShare Security Features. Security White Paper

Xerox DocuShare Security Features. Security White Paper Xerox DocuShare Security Features Security White Paper Xerox DocuShare Security Features Businesses are increasingly concerned with protecting the security of their networks. Any application added to a

More information

The Convergence of IT Security and Physical Access Control

The Convergence of IT Security and Physical Access Control The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which

More information

Comodo Authentication Solutions Overview

Comodo Authentication Solutions Overview Comodo Authentication Solutions Overview Client Authentication Certificates Two-Factor Authentication Content Verification Certificates Mutual Authentication Foreword Conducting business online offers

More information

Sticky Password 7. Sticky Password 7 is the latest, most advanced, portable, cross platform version of the powerful yet

Sticky Password 7. Sticky Password 7 is the latest, most advanced, portable, cross platform version of the powerful yet Sticky Password 7 Reviewer Guide Introduction Sticky Password 7 is the latest, most advanced, portable, cross platform version of the powerful yet simple password manager and form-filler. Its main goal

More information

YubiKey PIV Deployment Guide

YubiKey PIV Deployment Guide YubiKey PIV Deployment Guide Best Practices and Basic Setup YubiKey 4, YubiKey 4 Nano, YubiKey NEO, YubiKey NEO-n YubiKey PIV Deployment Guide 2016 Yubico. All rights reserved. Page 1 of 27 Copyright 2016

More information

SEZ SEZ Online Manual Digital Signature Certficate [DSC] V Version 1.2

SEZ SEZ Online Manual Digital Signature Certficate [DSC] V Version 1.2 SEZ SEZ Online Manual Digital Signature Certficate [DSC] V Version 1.2 Table of Contents 1 Introduction...2 2 Procurement of DSC...3 3 Installation of DSC...4 4 Procedure for entering the DSC details of

More information

Interwise Connect. Working with Reverse Proxy Version 7.x

Interwise Connect. Working with Reverse Proxy Version 7.x Working with Reverse Proxy Version 7.x Table of Contents BACKGROUND...3 Single Sign On (SSO)... 3 Interwise Connect... 3 INTERWISE CONNECT WORKING WITH REVERSE PROXY...4 Architecture... 4 Interwise Web

More information

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features MCTS Guide to Microsoft Windows 7 Chapter 7 Windows 7 Security Features Objectives Describe Windows 7 Security Improvements Use the local security policy to secure Windows 7 Enable auditing to record security

More information

Expert Reference Series of White Papers. Fundamentals of the PKI Infrastructure

Expert Reference Series of White Papers. Fundamentals of the PKI Infrastructure Expert Reference Series of White Papers Fundamentals of the PKI Infrastructure 1-800-COURSES www.globalknowledge.com Fundamentals of the PKI Infrastructure Boris Gigovic, Global Knowledge Instructor, CEI,

More information

White Paper: Managing Security on Mobile Phones

White Paper: Managing Security on Mobile Phones White Paper: Managing Security on Mobile Phones April 2006 Managing Security on Mobile Phones April 2006 Table of Contents Abstract...2 Executive Summary...2 The Importance Of Managing Security On Mobile

More information

INTEGRATION GUIDE. DIGIPASS Authentication for F5 FirePass

INTEGRATION GUIDE. DIGIPASS Authentication for F5 FirePass INTEGRATION GUIDE DIGIPASS Authentication for F5 FirePass Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO Data Security

More information

Identikey Server Product Guide 3.0 3.1

Identikey Server Product Guide 3.0 3.1 Identikey Server Product Guide 3.0 3.1 Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without

More information

Beyond passwords: Protect the mobile enterprise with smarter security solutions

Beyond passwords: Protect the mobile enterprise with smarter security solutions IBM Software Thought Leadership White Paper September 2013 Beyond passwords: Protect the mobile enterprise with smarter security solutions Prevent fraud and improve the user experience with an adaptive

More information

Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11)

Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11) Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11) Executive Summary...3 Background...4 Internet Growth in the Pharmaceutical Industries...4 The Need for Security...4

More information

Using GhostPorts Two-Factor Authentication

Using GhostPorts Two-Factor Authentication Using GhostPorts Two-Factor Authentication With CloudPassage Halo GhostPorts is a powerful two-factor authentication feature available with the Halo NetSec and Halo Professional subscription plans. GhostPorts

More information

DIGIPASS Authentication for SonicWALL SSL-VPN

DIGIPASS Authentication for SonicWALL SSL-VPN DIGIPASS Authentication for SonicWALL SSL-VPN With VACMAN Middleware 3.0 2006 VASCO Data Security. All rights reserved. Page 1 of 53 Integration Guideline Disclaimer Disclaimer of Warranties and Limitations

More information

Convenience and security

Convenience and security Convenience and security ControlSphere is a computer security and automation solution designed to protect user data and automate most of authentication tasks for the user at work and home environments.

More information

USER GUIDE WWPass Security for Windows Logon

USER GUIDE WWPass Security for Windows Logon USER GUIDE WWPass Security for Windows Logon December 2015 TABLE OF CONTENTS Chapter 1 Welcome... 3 Introducing WWPass Security for Windows Logon... 4 Related Documentation... 4 Presenting Your PassKey

More information

RSA Authentication Manager 7.1 Basic Exercises

RSA Authentication Manager 7.1 Basic Exercises RSA Authentication Manager 7.1 Basic Exercises Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA logo

More information

HOTPin Integration Guide: DirectAccess

HOTPin Integration Guide: DirectAccess 1 HOTPin Integration Guide: DirectAccess Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; Celestix assumes no responsibility

More information

how can I provide strong authentication for VPN access in a user convenient and cost effective manner?

how can I provide strong authentication for VPN access in a user convenient and cost effective manner? SOLUTION BRIEF CA Advanced Authentication how can I provide strong authentication for VPN access in a user convenient and cost effective manner? agility made possible provides a flexible set of user convenient,

More information

Security Digital Certificate Manager

Security Digital Certificate Manager System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure

More information

IDENTIKEY Server Windows Installation Guide 3.2

IDENTIKEY Server Windows Installation Guide 3.2 IDENTIKEY Server Windows Installation Guide 3.2 Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis,

More information

Neutralus Certification Practices Statement

Neutralus Certification Practices Statement Neutralus Certification Practices Statement Version 2.8 April, 2013 INDEX INDEX...1 1.0 INTRODUCTION...3 1.1 Overview...3 1.2 Policy Identification...3 1.3 Community & Applicability...3 1.4 Contact Details...3

More information

Whitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers

Whitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers Whitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers By INNEFU Labs Pvt. Ltd Table of Contents 1. Overview... 3 2. Threats to

More information